[go: up one dir, main page]

Hossain et al., 2018 - Google Patents

Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks.

Hossain et al., 2018

View PDF
Document ID
6568405656755758071
Author
Hossain M
Paul A
Islam M
Atiquzzaman M
Publication year
Publication venue
Netw. Protoc. Algorithms

External Links

Snippet

Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
US10298610B2 (en) Efficient and secure user credential store for credentials enforcement using a firewall
US10425387B2 (en) Credentials enforcement using a firewall
US20190354709A1 (en) Enforcement of same origin policy for sensitive data
Hossain et al. Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks.
US8990356B2 (en) Adaptive name resolution
US8683607B2 (en) Method of web service and its apparatus
Humayun et al. Industry 4.0 and cyber security issues and challenges
Puangpronpitag et al. Simple and lightweight HTTPS enforcement to protect against SSL striping attack
EP2311218B1 (en) Http authentication and authorization management
CN120266437A (en) Identity-based application of domain filtering rules using the Domain Name System (DNS) platform
LaCroix et al. Cookies and sessions: a study of what they are, how they work and how they can be stolen
Maidine et al. Cloud identity management mechanisms and issues
Muhammad et al. Evaluation of OpenID-Based doublefactor authentication for preventing session hijacking in web applications
Hallgren et al. Glasstube: A lightweight approach to web application integrity
Swanink et al. Persistent effects of man-in-the-middle attacks
Narula et al. Novel Defending and Prevention Technique for Man‐in‐the‐Middle Attacks in Cyber‐Physical Networks
Wang et al. Using web-referral architectures to mitigate denial-of-service threats
Hussain et al. Enc‐DNS‐HTTP: Utilising DNS Infrastructure to Secure Web Browsing
Kurnikov et al. Using safekeeper to protect web passwords
Luna Man-in-the–Middle Attack
Bharti et al. Prevention of Session Hijacking and IP Spoofing With Sensor Nodes and Cryptographic Approach
Tanwar Issues and challenges in web services
Lin et al. DAMUP: Practical and privacy-aware cloud-based DDoS mitigation
Al-Ibrahim et al. Cookie-less browsing
Holik Protecting IoT Devices with Software-Defined Networks